Ethical Hacking Training and Certification
What are the course objectives?
Craw security CEH v10 Certified Ethical Hacker training (earlier CEH v9) in Delhi provides hands-on classroom training to help you master the same techniques that hackers use to penetrate network systems and leverage them ethically to protect your own infrastructure. The extensive course focuses on 20 of the most popular security domains to provide a practical approach to essential security systems. You will learn to assess computer system security by using penetration testing techniques; scan, test and hack secure systems and applications, and gain hands-on experience with sniffing, phishing and exploitation tactics. This ethical hacking course in Delhi will prepare you for the EC-Council Certified Ethical Hacker exam 312-50.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
- Hacking History- How It All Began
- Need For Ethical Hacking
- Why We Require Ethical Hackers
- Types Of Hackers
- Steps In Ethical Hacking
- Scopes In Hacking
- To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).
- What is Stenography?
- Hiding data behind Images, PDFs, Audio and Videos files
SQL Injection Using DVWA
- Introduction of SQL
- What are SQL INJECTION and DVWA?
- Checking SQL injection vulnerability (Demo)
- Live demonstration of the attack (Demo)
- How to protect your system from attacks
In or ethical hacking certification course we have 28 modules and these are listed below-
MODULE 1:- INTRODUCTION TO BASICS OF ETHICAL HACKING
MODULE 2:- FOOT-PRINTING ACTIVE(TOOL BASED PRACTICAL)
MODULE 3:- FOOT-PRINTING PASSIVE(PASSIVE APPROACH)
MODULE 4:- IN-DEPTH NETWORK SCANNING
MODULE 5:- ENUMERATION USER IDENTIFICATION
MODULE 6:- SYSTEM HACKING PASSWORD
MODULE 7:- VIRUSES AND WORMS
MODULE 8:- TROJANS AND BACKDOOR
MODULE 9:- SNIFFERS MITM WITH WINDOW
MODULE 10:- BOT AND BOTNETS
MODULE 11:- SNIFFERS MITM WITH WINDOW
MODULE 12:- SOCIAL ENGINEERING TECHNIQUES
MODULE 13:- SOCIAL ENGINEERING TOOLKIT PRACTICAL BASED
MODULE 14:- DENIAL O SERVICES DOS DDOS ATTACKS
MODULE 15:- WEB SESSION HIJECKING
MODULE 16:- SQL INJECTION MANUAL TESTING
MODULE 17:- SQL INJECTION AUTOMATED TOOL BASED TESTING
MODULE 18:- BASICS OF WEB APP SECURITY
MODULE 19:- HACKING WEB SERVERS SERVERS ROOTING
MODULE 20:- HACKING WIRELESS NETWORK MANUAL CLI BASED
MODULE 21:- HACKING WIRELESS NETWORK : AUTOMATED TOOL BASED
MODULE 22:- EVADING IDS,FIRWALLS
MODULE 23:- HONEY POTS
MODULE 24:- BUFFER OVERFLOW
MODULE 25:- CRYPTOGRAPHY
MODULE 26:- PENETRATION TESTING : BASICS
MODULE 27:- MOBILE HACKING
MODULE 28:- CLOUD SECURITY AND MANY MORE,…….
With This you will have
- weekends and weekdays training
- classroom and online training
- 2 years membership
- 80% practical and 20% theoretical
- 250 GB toolkit
- video tutorials
- audio tutorials practice labs
- extra classes/backup classes
course duration:- 60 hours course
Recommended Courses Offered By CRAW Security